Home
last modified time | relevance | path

Searched refs:password_len (Results 1 – 16 of 16) sorted by relevance

/external/wpa_supplicant/
Dms_funcs.c58 void nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument
64 if (password_len > 256) in nt_password_hash()
68 for (i = 0; i < password_len; i++) { in nt_password_hash()
73 len = password_len * 2; in nt_password_hash()
122 const u8 *password, size_t password_len, in generate_nt_response() argument
130 nt_password_hash(password, password_len, password_hash); in generate_nt_response()
224 void generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument
231 nt_password_hash(password, password_len, password_hash); in generate_authenticator_response()
247 size_t password_len, u8 *response) in nt_challenge_response() argument
250 nt_password_hash(password, password_len, password_hash); in nt_challenge_response()
[all …]
Deap_otp.c44 size_t password_len, len; in eap_otp_process() local
57 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
61 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
79 password_len, EAP_CODE_RESPONSE, req->identifier, in eap_otp_process()
83 os_memcpy(rpos, password, password_len); in eap_otp_process()
85 password, password_len); in eap_otp_process()
Deap_leap.c74 size_t identity_len, password_len; in eap_leap_process_request() local
79 password = eap_get_config_password(sm, &password_len); in eap_leap_process_request()
126 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request()
201 size_t password_len; in eap_leap_process_response() local
205 password = eap_get_config_password(sm, &password_len); in eap_leap_process_response()
242 nt_password_hash(password, password_len, pw_hash); in eap_leap_process_response()
278 size_t len, password_len; in eap_leap_process() local
281 password = eap_get_config_password(sm, &password_len); in eap_leap_process()
335 size_t elen[5], password_len; in eap_leap_getKey() local
340 password = eap_get_config_password(sm, &password_len); in eap_leap_getKey()
[all …]
Deap_gtc.c59 size_t password_len, identity_len, len, plen; in eap_gtc_process() local
86 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process()
90 password = eap_get_config_password(sm, &password_len); in eap_gtc_process()
107 plen = password_len; in eap_gtc_process()
124 os_memcpy(rpos, password, password_len); in eap_gtc_process()
Dms_funcs.h20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
38 size_t password_len, u8 *response);
42 void nt_password_hash(const u8 *password, size_t password_len,
Deap_mschapv2.c183 const u8 *password, size_t password_len, in eap_mschapv2_derive_response() argument
196 password, password_len); in eap_mschapv2_derive_response()
199 password, password_len, nt_response); in eap_mschapv2_derive_response()
204 generate_authenticator_response(password, password_len, in eap_mschapv2_derive_response()
212 nt_password_hash(password, password_len, password_hash); in eap_mschapv2_derive_response()
230 size_t username_len, identity_len, password_len; in eap_mschapv2_challenge_reply() local
236 password = eap_get_config_password(sm, &password_len); in eap_mschapv2_challenge_reply()
284 password, password_len, in eap_mschapv2_challenge_reply()
380 config->password_len = config->new_password_len; in eap_mschapv2_password_changed()
573 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() local
[all …]
Deap_md5.c45 size_t len, challenge_len, password_len; in eap_md5_process() local
49 password = eap_get_config_password(sm, &password_len); in eap_md5_process()
104 elen[1] = password_len; in eap_md5_process()
Deap_ttls.c707 config->password, config->password_len); in eap_ttls_phase2_request_mschapv2()
710 config->password, config->password_len, in eap_ttls_phase2_request_mschapv2()
713 generate_authenticator_response(config->password, config->password_len, in eap_ttls_phase2_request_mschapv2()
722 nt_password_hash(config->password, config->password_len, in eap_ttls_phase2_request_mschapv2()
803 config->password, config->password_len, in eap_ttls_phase2_request_mschap()
806 config->password, config->password_len); in eap_ttls_phase2_request_mschap()
844 pos = buf = os_malloc(config->identity_len + config->password_len + in eap_ttls_phase2_request_pap()
859 pad = (16 - (config->password_len & 15)) & 15; in eap_ttls_phase2_request_pap()
861 config->password_len + pad); in eap_ttls_phase2_request_pap()
862 os_memcpy(pos, config->password, config->password_len); in eap_ttls_phase2_request_pap()
[all …]
Dconfig_ssid.h260 size_t password_len; member
Deap_pax.c93 len[0] = config->password_len; in eap_pax_init()
Dctrl_iface.c161 ssid->password_len = os_strlen(pos); in wpa_supplicant_ctrl_iface_ctrl_rsp()
Deap.c1769 *len = config->password_len; in eap_get_config_password()
/external/dropbear/libtomcrypt/src/misc/pkcs5/
Dpkcs_5_2.c31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2()
95 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
Dpkcs_5_1.c29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { in pkcs_5_alg1()
/external/dropbear/libtomcrypt/src/headers/
Dtomcrypt_pkcs.h74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
/external/dropbear/libtomcrypt/
Dcrypt.tex4778 unsigned long password_len,
4801 unsigned long password_len,
4824 unsigned long outlen, password_len, salt_len;
4832 if ((err = pkcs_5_alg2(password, password_len, salt,